Items Tagged with "Information Security"


3a51104c66686fac95156c1a1d632bd4

If you Knew you Were Going to be Attacked, What Would you do Differently?

August 14, 2013 Added by:Bill Wheeler

Recent reports have found that cyberattacks against U.S. corporations are on the rise, along with an increase in international threats, especially from China, and emerging threats to small businesses. Today, it’s not a matter of if an organization will be the victim of a cyberattack, but when.

Comments  (0)

888605c6c25c19e41bbbb986ea6d43c1

Another Paradigm Shift - I'm Getting Motion Sickness

July 08, 2013 Added by:Jim Palazzolo

Before you protect the data, find the data. Before you create security controls, find the assets. Before you think about the future, find the blueprints for today. Before you attempt to know others, know yourself first.

Comments  (0)

1488d8c03dfd3125db25b6aec94dcf92

Brand Damage Through Information Access

June 20, 2013 Added by:Eric Chiu

In a competitive business environment, reputation is a critical differentiator. Any company that suffers from a major data breach, instigated by an employee with a small grudge and big access, could face devastating consequences to the corporate brand, and to the bottom line.

Comments  (0)

875b62bb8cdfb9fb199603e9e24a54a6

Digital Usage Policies and the ‘New’ Desktop

May 31, 2013 Added by:Mark Austin

The PC desktop is changing, so fast that what used to confidently be called the “desktop” is undergoing the sort of rapid evolution bound to throw up new and unfamiliar security challenges.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Deconstructing 'Defensible' - Too Many Assets, not Enough Resources

April 19, 2013 Added by:Rafal Los

In just about every organization (with little exception) there are more things to defend than there are resources to defend with. Remember playing the game of Risk, when you were a kid? Maybe you still have the game now... amazing how close to that board game your life in InfoSec is now, isn't it?

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

Identity in the Modern Enterprise

March 12, 2013 Added by:Simon Moffatt

The view of IAM 1.0 (enterprise provisioning) and IAM 2.0 (federated identity, 'cloud' services and so) is continually evolving and it's pretty clear that identity management now has a greater role to play for many organisations, as they look to embrace things like increased mobility and out sourced service driven applications.

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

The Blurring of the Business Identity

February 26, 2013 Added by:Simon Moffatt

The concept of a well defined business identity is blurring and this is causing a complex reaction in the area of identity and access management. Internal, enterprise class identity and access management (IAM) has been long defined, as the managing of user access as defined by approval workflows, authoritative source integration and well defined system connectivity.

Comments  (0)

37d5f81e2277051bc17116221040d51c

What Security Challenges to Focus on in the New Year

February 15, 2013 Added by:Robert Siciliano

In 2012, security challenges we faced were often the ribbon cuttings and business plans that startup criminal organizations launched. In 2013, those criminal enterprise business plans will come together—and we need to be ready.

Comments  (0)

37d5f81e2277051bc17116221040d51c

What We Learned About Digital Security In 2012

February 12, 2013 Added by:Robert Siciliano

Sometimes it’s the worst things that can happen that become the eye-opening best things that effect positive change. The year 2012 saw numerous high-profile data breaches, epic hacks, full-on hacktivism and lots of major identity theft ring busts.

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

Security Analytics: Hype or Huge?

February 01, 2013 Added by:Simon Moffatt

This complex chain of correlated "security big data", can be used in a manner of ways from post-incident analysis and trend analytics as well as for the mapping of internal data to external threat intelligence. Big data is here to stay and security analytics just needs to figure out the best way to use it...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Information Security Management Handbook

January 28, 2013 Added by:Ben Rothke

While the book is organized under the CISSP CBK domains, it should not readily be used as a primary reference for those studying for the CISSP exam, given its unmanageable length as a primary reference...

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

ESB Security Spotlighted At ZeroNights 2012

December 25, 2012 Added by:Alexander Polyakov

ERP systems, which store the information about finances, employees, materials, wages, and so on, are rightfully considered to be the most critical of such systems. Unauthorized access to those systems can lead to espionage, sabotage, or fraud...

Comments  (0)

Af9c34417f8e5e0d240850bb353b5d40

Security is Inconvenient, Deal With It!

December 17, 2012 Added by:Keith Mendoza

ZD Net had an article entitled "Kernel vulnerability places Samsung devices at risk" and I thought "so, what's new" until I followed the link to the forum post on xda-developers. Then I just lost it because I'm certain that this is a result of plain and simple laziness...

Comments  (2)

Bddcc5065237c686cb4d89dba8b276f2

Organizational Influence via Security Team Branding

December 09, 2012 Added by:Steven Fox, CISSP, QSA

Hacker Halted 2012 was full of personalities; executives, technologists, students and security enthusiasts – each one with stories that fueled conversations and debate. Technical and business erudition dominated the speaker sessions and the hacking competitions...

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

Information Security: Why Bother?

December 09, 2012 Added by:Simon Moffatt

The question, often raised as a bargaining tool, is often focused on the, ‘well I understand what you propose and I know it will increase the security of scenario X, but why should I do it?’. In honesty, it is a good question...

Comments  (3)

Bd07d58f0d31d48d3764821d109bf165

Book Review: Liars and Outliers

November 29, 2012 Added by:Tripwire Inc

Liars and Outliers is such a departure from his usual technical subject matter, that I was concerned that Mr. Schneier may have overreached. It’s not every day that a security guru talks about theories of coercion and explains how society establishes and maintains trust – that’s about society, not components...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »